Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.IT

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Information Theory

Authors and titles for September 2010

Total of 129 entries : 1-25 26-50 51-75 76-100 101-125 ... 126-129
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:1009.2077 [pdf, other]
Title: A new sufficient condition for sum-rate tightness in quadratic Gaussian multiterminal source coding
Yang Yang, Yifu Zhang, Zixiang Xiong
Subjects: Information Theory (cs.IT)
[27] arXiv:1009.2118 [pdf, other]
Title: Restricted strong convexity and weighted matrix completion: Optimal bounds with noise
Sahand Negahban, Martin J. Wainwright
Subjects: Information Theory (cs.IT); Statistics Theory (math.ST)
[28] arXiv:1009.2221 [pdf, other]
Title: Performance Bounds and Design Criteria for Estimating Finite Rate of Innovation Signals
Zvika Ben-Haim, Tomer Michaeli, Yonina C. Eldar
Comments: 23 pages, 4 figures. Submitted to IEEE Trans. Information Theory
Subjects: Information Theory (cs.IT)
[29] arXiv:1009.2274 [pdf, other]
Title: Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
Amitav Mukherjee, A. Lee Swindlehurst
Comments: 10 pages, 5 figures; to appear, IEEE Transactions on Signal Processing, 2010
Subjects: Information Theory (cs.IT)
[30] arXiv:1009.2305 [pdf, other]
Title: Message Error Analysis of Loopy Belief Propagation for the Sum-Product Algorithm
Xiangqiong Shi, Dan Schonfeld, Daniela Tuninetti
Comments: 36 pages, 10 figures
Subjects: Information Theory (cs.IT)
[31] arXiv:1009.2370 [pdf, other]
Title: Optimized IR-HARQ Schemes Based on Punctured LDPC Codes over the BEC
Iryna Andriyanova, Emina Soljanin
Comments: IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT)
[32] arXiv:1009.2443 [pdf, other]
Title: Delay-Optimal User Scheduling and Inter-Cell Interference Management in Cellular Network via Distributive Stochastic Learning
Huang Huang, Vincent K. N. Lau
Subjects: Information Theory (cs.IT)
[33] arXiv:1009.2464 [pdf, other]
Title: Various virtual structures on single file system
Maksim Malkov
Comments: 5 pages, 8 figures. In Russian
Subjects: Information Theory (cs.IT)
[34] arXiv:1009.2528 [pdf, other]
Title: Is Witsenhausen's counterexample a relevant toy?
Pulkit Grover, Anant Sahai
Comments: preprint for paper that will appear in proceedings of 49th IEEE Conference on Decision and Control (CDC) 2010, Atlanta, Georgia
Subjects: Information Theory (cs.IT); Systems and Control (eess.SY)
[35] arXiv:1009.2556 [pdf, other]
Title: Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks
Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran
Comments: 37 pages, 11 figures, submitted to IT transactions
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[36] arXiv:1009.2602 [pdf, other]
Title: Joint Channel Probing and Proportional Fair Scheduling in Wireless Networks
Hui Zhou (1), Pingyi Fan (1), Dongning Guo (2) ((1) Tsinghua University, China, (2) Northewstern University, US)
Comments: 26 pages, 8 figures
Subjects: Information Theory (cs.IT)
[37] arXiv:1009.2651 [pdf, other]
Title: Left-Inverses of Fractional Laplacian and Sparse Stochastic Processes
Qiyu Sun, Michael Unser
Comments: Advances in Computational Mathematics, accepted
Subjects: Information Theory (cs.IT); Statistics Theory (math.ST)
[38] arXiv:1009.2927 [pdf, other]
Title: Underlay Cognitive Radio with Full or Partial Channel Quality Information
Na Yi, Yi Ma, Rahim Tafazolli
Comments: 29 Pages, 8 figures
Journal-ref: International Journal of Navigation and Observation 2010
Subjects: Information Theory (cs.IT)
[39] arXiv:1009.2955 [pdf, other]
Title: Throughput Analysis of Buffer-Constrained Wireless Systems in the Finite Blocklength Regime
Mustafa Cenk Gursoy
Subjects: Information Theory (cs.IT)
[40] arXiv:1009.3041 [pdf, other]
Title: Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
Chan Wong Wong, Tan F. Wong, John M.Shea
Comments: submitted to IEEE Trans. on Information Forensics and Security, special issues on using the physical layer for securing the next generation of communication systems
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[41] arXiv:1009.3052 [pdf, other]
Title: Secret-key Agreement with Channel State Information at the Transmitter
Ashish Khisti, Suhas Diggavi, Gregory Wornell
Comments: 10 Pages, Submitted to IEEE Transactions on Information Forensics and Security, Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems
Subjects: Information Theory (cs.IT)
[42] arXiv:1009.3083 [pdf, other]
Title: The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
Stefano Rini, Daniela Tuninetti, Natasha Devroye
Comments: submitted to IEEE International Conference on Communications ICC2011, Kyoto, Japan
Subjects: Information Theory (cs.IT)
[43] arXiv:1009.3090 [pdf, other]
Title: Open-Loop Spatial Multiplexing and Diversity Communications in Ad Hoc Networks
Raymond H. Y. Louie, Matthew R. McKay, Iain B. Collings
Comments: 51 pages, 19 figures, submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT)
[44] arXiv:1009.3130 [pdf, other]
Title: Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven W. McLaughlin
Comments: 11 pages, 4 figures. Submitted to the IEEE Transactions on Information Forensics and Security
Subjects: Information Theory (cs.IT)
[45] arXiv:1009.3145 [pdf, other]
Title: Universal Rate-Efficient Scalar Quantization
Petros T. Boufounos
Subjects: Information Theory (cs.IT)
[46] arXiv:1009.3186 [pdf, other]
Title: Group Testing with Probabilistic Tests: Theory, Design and Application
Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli
Comments: Full version of the conference paper "Compressed Sensing with Probabilistic Measurements: A Group Testing Solution" appearing in proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, 2009 (arXiv:0909.3508). To appear in IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT)
[47] arXiv:1009.3253 [pdf, other]
Title: Transmission Strategies in Multiple Access Fading Channels with Statistical QoS Constraints
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar
Subjects: Information Theory (cs.IT)
[48] arXiv:1009.3291 [pdf, other]
Title: Rebuilding for Array Codes in Distributed Storage Systems
Zhiying Wang, Alexandros G. Dimakis, Jehoshua Bruck
Comments: 7 pages, 3 figures, accepted by workshop on the Application of Communication Theory to Emerging Memory Technologies (ACTEMT) 2010
Subjects: Information Theory (cs.IT); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[49] arXiv:1009.3345 [pdf, other]
Title: Cooperative Feedback for MIMO Interference Channels
Kaibin Huang, Rui Zhang
Comments: 5 pages; submitted to IEEE ICC 2011
Subjects: Information Theory (cs.IT)
[50] arXiv:1009.3354 [pdf, other]
Title: Direct vs. Two-Step Approach for Unique Word Generation in UW-OFDM
Alexander Onic, Mario Huemer
Journal-ref: Proceedings of the 15th International OFDM Workshop, Hamburg, 2010
Subjects: Information Theory (cs.IT)
Total of 129 entries : 1-25 26-50 51-75 76-100 101-125 ... 126-129
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack